Skip to main content
Treadstone 71 Home
About T71
Accolades
The TreadStone 71 Difference
Benefits of Treadstone 71 Training
Videos
Affiliate Program for Training
Strategic Intelligence Analysis - Certification
Course Details
Building a Cyber Intelligence Program Training Course
Structured Analytic Techniques (Online)
Intelligence & CounterIntelligence Cyberspace Lifecycle Operations
Certified Cyber Intelligence Analyst
Cyber CounterIntelligence Tradecraft Certification
Cyber Intelligence Training Courses online and in-person
Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
Analytic Writing (Reports and Briefs) On Demand
Cognitive Warfare
Training Subscription
Intel Services
Analysis As a Service
Cyber Intelligence RFI
Analysis - Reports and Briefs
Admiralty Scoring Model Evidence Verification Automation - AI
Analyzing Targeted Cyber-HUMINT - A Short How To
Automating Cyber Intelligence Analysis
Automating Intelligence Source Verification
China Cognitive Warfare Methods Brief from Treadstone 71
Developing Automated Report-Generation Capabilities
Fallacies in Threat Intelligence - English
Fallacies in Threat Intelligence - Arabic
Information diversions from the war on Ukraine
Iranian Influence Operations
Iranian Link Analysis - Inside the Wire
Integrating and automating SATs - Structured Analytic Techniques
Middle East Cyber Domain - English
Middle East Cyber Domain - Arabic
Regularly Evaluate Algorithm Performance for Report Generation and Automation
Speeding the intelligence analysis peer review process with AI
Statement of Cyber CounterIntelligence
STEMPLES Plus as a Framework to Assess Cyber Capabilities
Adversary Baseball Cards
Mr. Tekide Baseball Card
Cyber and Threat Intelligence Program Build Service
Stakeholder Analysis - English
Stakeholder Analysis - Arabic
What Intelligence Can and Cannot Do
Cyber Intelligence Capability Maturity Model Assessments
Cyber Threat Intelligence Maturity Assessment, Strategic Planning and Program Build
Interim Head of Intelligence
Internal Intelligence Communities of Interest
Intelligence Requirements
Treadstone 71 Priority Intelligence Requirements
OPSEC Assessment - Intelligence Preparation of the Cyber Battlefield
Targeted Research - Influence Operations
Counter and Contain - Influence Operations
Threat Intelligence Platform Selection and Rollout
Products
Conscientia - The Cyber and Threat Intelligence Lifecycle Solution
Cyber Intelligence Tradecraft Reference Guides
CyberIntellipedia
Course Shopping Cart
Intelligence - AI - Our Blog
Intel Briefs
The Evolution of Cognitive Warfare
Iranian Intelligence Cognitive Warfare Ops - a Rollup
A Shift in Capabilities - Iranian Influence Operations
ISIS Organization Chart and Technical Outline
Russian Cyber Warfare - The Russian Cyber Army
Iranian Influence Operations - Treadstone 71 Intelligence Advisory
Hybrid Operations and Cognitive Warfare Actions by Iran Continue Against Opposition Groups
Treadstone 71 at RSA Con San Francisco
Cyber Intelligence RFI Form
Intelligence Games in the Power Grid
Bulletproof Vests - Syrian Manufacturing with Russian Assistance
Mr.Tekide - APT34 Crypters
Chinese Cognitive Warfare Methods
Imad Mughniyeh - Ghosts of Beirut
331-999-0071
Treadstone 71 Home
About T71
Accolades
The TreadStone 71 Difference
Benefits of Treadstone 71 Training
Videos
Affiliate Program for Training
Strategic Intelligence Analysis - Certification
Course Details
Building a Cyber Intelligence Program Training Course
Structured Analytic Techniques (Online)
Intelligence & CounterIntelligence Cyberspace Lifecycle Operations
Certified Cyber Intelligence Analyst
Cyber CounterIntelligence Tradecraft Certification
Cyber Intelligence Training Courses online and in-person
Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
Analytic Writing (Reports and Briefs) On Demand
Cognitive Warfare
Training Subscription
Intel Services
Analysis As a Service
Cyber Intelligence RFI
Analysis - Reports and Briefs
Admiralty Scoring Model Evidence Verification Automation - AI
Analyzing Targeted Cyber-HUMINT - A Short How To
Automating Cyber Intelligence Analysis
Automating Intelligence Source Verification
China Cognitive Warfare Methods Brief from Treadstone 71
Developing Automated Report-Generation Capabilities
Fallacies in Threat Intelligence - English
Fallacies in Threat Intelligence - Arabic
Information diversions from the war on Ukraine
Iranian Influence Operations
Iranian Link Analysis - Inside the Wire
Integrating and automating SATs - Structured Analytic Techniques
Middle East Cyber Domain - English
Middle East Cyber Domain - Arabic
Regularly Evaluate Algorithm Performance for Report Generation and Automation
Speeding the intelligence analysis peer review process with AI
Statement of Cyber CounterIntelligence
STEMPLES Plus as a Framework to Assess Cyber Capabilities
Adversary Baseball Cards
Mr. Tekide Baseball Card
Cyber and Threat Intelligence Program Build Service
Stakeholder Analysis - English
Stakeholder Analysis - Arabic
What Intelligence Can and Cannot Do
Cyber Intelligence Capability Maturity Model Assessments
Cyber Threat Intelligence Maturity Assessment, Strategic Planning and Program Build
Interim Head of Intelligence
Internal Intelligence Communities of Interest
Intelligence Requirements
Treadstone 71 Priority Intelligence Requirements
OPSEC Assessment - Intelligence Preparation of the Cyber Battlefield
Targeted Research - Influence Operations
Counter and Contain - Influence Operations
Threat Intelligence Platform Selection and Rollout
Products
Conscientia - The Cyber and Threat Intelligence Lifecycle Solution
Cyber Intelligence Tradecraft Reference Guides
CyberIntellipedia
Course Shopping Cart
Intelligence - AI - Our Blog
Intel Briefs
The Evolution of Cognitive Warfare
Iranian Intelligence Cognitive Warfare Ops - a Rollup
A Shift in Capabilities - Iranian Influence Operations
ISIS Organization Chart and Technical Outline
Russian Cyber Warfare - The Russian Cyber Army
Iranian Influence Operations - Treadstone 71 Intelligence Advisory
Hybrid Operations and Cognitive Warfare Actions by Iran Continue Against Opposition Groups
Treadstone 71 at RSA Con San Francisco
Cyber Intelligence RFI Form
Intelligence Games in the Power Grid
Bulletproof Vests - Syrian Manufacturing with Russian Assistance
Mr.Tekide - APT34 Crypters
Chinese Cognitive Warfare Methods
Imad Mughniyeh - Ghosts of Beirut
Intelligence Tradecraft and Cognitive Warfare
Contact Treadstone 71
Please note that only corporate email domains are allowed. Gmail, Hotmail, Yahoo, etc will be rejected.
Full Name
(*)
Please type your full name.
Company Name
(*)
Invalid Input
Comments or Questions
Invalid Input
E-mail
(*)
Invalid email address.
Area of Interest
(*)
Please Select
Two Year Training Subscription
General Inquiry
Adversary Targeting
All Source Intelligence
Analysis as a Service
Becoming a Training Content Provider
Building a Cyber Intelligence Program Facilitated Training
Cognitive Warfare
Color Revolutions
Communities of Interest
Consulting
Contain and Counter Influence Operations
CounterIntelligence Services
Custom Training
Cyber Intelligence Maturity Assessment
Cyber Intelligence Training
Geopolitical Research
Hybrid Warfare
Intelligence and CounterIntelligence - Cyberspace Lifecycle and Operations
Intelligence Estimates
Intelligence Requirements
Interim Head of Intelligence
Open-Source Intelligence
OPSEC Assessment
Priority Intelligence Requirements
Raw Collection
Reference Guides
Request for Proposal
Soft Power
Stakeholder Analysis
Strategic Intelligence Analysis
Subscriptions
Targeted Research and Analysis
Two Hundred for Two Years
Warning Intelligence
Please tell us your area of interest.
Areas of Potential Interest
Invalid Input
Add your full company URL with http(s)
(*)
Invalid Input
Submit
Reset
Invalid Input
Contact Treastone 71
Contact Treadstone 71 Today. Learn more about our Targeted Adversary Analysis, Cognitive Warfare Training, and Intelligence Tradecraft offerings.
Contact us today!